Possible email hacked

I would greatly appreciate someone looking at my laptop. I believe my email may ave been hacked or I may have some king of Malware. Thank you in advance for your valuable assistance. Also, I am having trouble getting a report from Malwarebytes (I am posting the one I did get). It is running a version I do not understand and even thought I followed your directions on how to download and run it, nothing in your instructions is the same as the download. I get a report but there is nothing in it. Please advise me on this issue. Thank you again.

Following are the logs requested I could get. I look forward to your response.

Also, I am having trouble getting a report from Malwarebytes (I am posting the one I did get). It is running a version I do not understand and even thought I followed your directions on how to download and run it, nothing in your instructions is the same as the download.

Yes, Malwarebytes changed the user interface since version 3. You ran well the latest version of the program. That is okay.

Now if you suspect your e-mail account has been hacked I strongly suggest you change your password immediately.

I see you have CCleaner installed on your laptop. I strongly advise you not to use the registry cleaning function. Registry Cleaners are known to be harmful to the system and should not be used for any reason there is. It's a known fact that using these programs can easily break a Windows installation, to the point where a complete re-installation might be needed.

That being said, please follow the instructions below, run the scans and post the logs for my review.

NOTICE: The following script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Highlight the contents of the below code box and press Ctrl + C on your keyboard:

Hi, thank you for your assistance. I highlighted the items in the box and pressed control c but nothing happened. Can you please give me more direction on the following directions as I have no idea where to find these.

Okay, to run the script with the Farbar tool (FRST) you need to highlight the entire text inside the code box and then press the Control + C buttons at the same time. This will copy the text you highlighted into the clipboard.

Now open FRST and click the Fix button only once and wait.

Note: There's no need to paste the script into FRST.

Restart the computer if prompted.

When the fix is complete FRST will generate a log named Fixlog.txt in the same location it was run from.

Please copy and paste its contents into your reply.

Next, please download AdwCleaner by Malwarebytes and save the file to your Desktop.

Right-click on the program and select Run as Administrator to start the tool.

Accept the Terms of use.

Wait until the database is updated.

Click Scan Now.

When finished, please click Clean & Repair.

Your laptop should reboot now if any items were found.

After reboot, a log file will be opened. Attach or Copy its content into your next reply.

In your next reply please post the entire contents of both Fixlog.txt and AdwCleaner logs.

Good morning, I completed the scans as instructed. Following are the logs you requested. Also, can you please explain to me what "whitelisted" is? When I open my email and click on one of the emails, it opens a new window and says I have to click on either Yahoo mail pro or whitelist Yahoo mail. Thank you for your very valuable assistance it is greatly appreciated.

"whitelisted" means the list of legitimate items of something (services, apps, e-mails, company names, etc.). In short, it means "good" or reliable items or entries in a log. For instance a Microsoft signed entry is classified as legitimate, therefore is shown as "whitelisted".

ESET will now begin scanning your laptop. This may take some time to finish, so please be patient.

When the scan is finished and if threats have been detected, select Save scan log. Save it to your Desktop as eset.txt. Click on Continue.

ESET Online Scanner may ask if you'd like to turn on the Periodic Scan feature. Click on Continue.

On the next screen, you can leave feedback about the program if you wish. Check the box for Delete application data on closing. If you left feedback, click Submit and continue. If not, Close without feedback.

Open the scan log on your Desktop (eset.txt) and copy and paste its contents into your next reply.

Thank you for the information. I ran the Eset but the re was no log to post. I want to thank you again for all of your valuable time and assistance I greatly appreciate it. Everything seems to be running great for now. I am going to make a 25.00 donation for your assistance, I wish it could be a lot more, but with no work things are a bit tight. Please stay safe and healthy.

I'm glad to know your laptop is running well and thank you very much for your donation.

Below I have included a number of recommendations for how to protect your computer in order to prevent malware infections. Please consider using these ideas to help secure your computer.

Please note: Many installer offer third-party downloads that are installed automatically when you do not uncheck certain checkboxes. While most of the time not being malicious you usually do not want these on your computer. Be careful during the installation process and you will avoid seeing tons of new unwanted toolbars in your favorite web browser.

Keep Malwarebytes Anti-Malware (MBAM) update and perform a regular scan to your system as it will make it harder for malware to reside on your computer.
A tutorial on using MBAM can be found here and a complete guide here

Please Note: Only the paid for version has real time capabilities. Please go here and scroll down to find a comparison list of the two versions.

Note that there are a lot of rogue programs out there that want to scare you into giving them your money and some malware actually claims to be security programs. If you get a popup for a security program that you did not install yourself, do NOT click on it and ask for help immediately. It is very important to run an antivirus and firewall, but you can't always rely on reviews and ads for information. Ask in a security forum that you trust if you are not sure.

A similar category of programs is now called "scareware." Scareware programs are active infections that will pop-up on your computer and tell you that you are infected. If you look closely, it will usually have a name that looks like it might be legitimate, but it is NOT one of the programs you installed. It tells you to click and install it right away. If you click on any part of it, including the 'X' to close it, you may actually help it infect your computer further. Keeping protection updated and running resident protection can help prevent these infections. If it happens anyway, get offline as quickly as you can. Pull the internet connection cable or shut down the computer if you have to. Contact someone to help by using another computer if possible. These programs are also sometimes called 'rogues', but they are different than the older version of rogues mentioned above.

Another most feared threat at the moment is an infection by a Ransomware. A Ransomware infection is a program that ransoms the data or functionality of your computer until you perform an action. This action is typically to pay a ransom in the form of Bitcoins or another payment method. I advise you to read more info on this terrible threat here and here.

Please keep your programs up to date. This applies to most of the programs and all your Internet Browsers in particular. Vulnerabilities in the programs are often exploited in order to install malware on your PC.